Internet Basics (click on hyperlinks for more info) 51 • The Internet and the WWW (World Wide Web) are not the same. • The WWW is explored using a browser and the act of browsing the Internet is commonly referred to as surfing. • Users browse websites and web pages by following hyperlinks that point to an address more commonly referred to as a URL. • Finding information on the Internet is achieved using a search engine. • Files, pictures, songs, and video can be shared by downloading (receiving) and uploading (sending). Continued on next page…
My Study Notes
Internet Basics (continued) 53 • The Internet utilizes the TCP/IP protocol and is accessed using a dialup modem, broadband, 3G, 4G, or network connected through an ISP. • With broadband, many computers and devices use Wi-Fi to connect to a router and share an Internet connection. • The computer you're using to view this web page is considered a host and it's connected to our server to view this page. LINK: https://www.computerhope.com/jargon/i/internet.htm
My Study Notes
Advantages of the Internet 55 • Information, knowledge, and learning • Connectivity, communication, and sharing • Address, mapping, and contact information • Banking, bills, and shopping • Selling and making money • Collaboration, work from home, and access to a global workforce • Donations and funding • Entertainment • Cloud computing and cloud storage • Remote control of devices at home (i.e.. Heaters / thermostats & the like)
My Study Notes
Disadvantages of the Internet 57 • Trolls, bullying, and stalkers • Pornographic and violent images • Addiction, time-waster, and causes distractions • Never being able to disconnect from work • Crime, identity theft, hacking, viruses, and cheating • Spam and advertising • Affects focus and patience • Depression, loneliness, and social isolation (dis-communication disorders) • Health issues and obesity • Echo chambers, filter bubbles, and personalized content • Fake news, propaganda, cyber terrorism • Buying things you don't need
My Study Notes
Viruses (computer virus) Defined 59 • A computer virus, aka malware and spyware, is a malicious program (harmful programme), script, macro (macroinstruction), or code designed to damage, steal personal information, modify data, send e-mail, display messages, or a combination of these actions. • When the virus is executed, it spreads by copying itself into or over data files, programs, the hard drive boot sector, or anything else writable. • To help spread the virus, writers use knowledge of security vulnerabilities, zero-days, or social engineering to gain access to a host's computer. Link to explain “zero-days” or “zero-day exploit / flaw”: https://www.computerhope.com/jargon/z/zeroday.htm
My Study Notes
Viruses – How can they enter? 61 • It is often distributed through shareware, pirated software, e-mail, P2P programs, or other programs where users share data. • Once downloaded, copied, or otherwise acquired, if the infected program is executed, it can potentially affect anything that a computer can access. • BEWARE, while browsing the Internet, an Internet advertisement or window appears that says “your computer is infected” or that “a unique plug-in is required”. Without fully understanding what it is you're getting, you accept the prompt. • When installing or updating a program, you're often asked if you want "additional software" to be installed. Often, this option is presented as a check box, which is already checked. So, if you click "Next" or "OK," the program considers that as permission, and installs the software. For this reason, be very careful when installing software.
My Study Notes
Read and Scan Before Installing 63 Read before you download, scan after a download BEFORE installing a download! • Most programmes have built-in warning software, but still viruses and spyware can get past. • When downloading any software (programs, utilities, games, updates, demos, etc.) via the Internet, make sure you're downloading the software from a reliable source. • Be sure to run your downloads through your antivirus and spyware scanners upon completion. As we stated in a previous section, during the installation process, read all prompts about what the program is installing on your computer.
My Study Notes
Anti-virus Protection 65 • An antivirus programme monitors, detects, and cleans any computer viruses by looking for virus signatures. • A virus signature is the fingerprint of a virus and it is a set of unique data, or bits of code, that allow it to be identified. • Antivirus software uses a virus signature to find a virus in a computer file system, allowing to detect, quarantine, and remove the virus. • In the antivirus software, the virus signature is referred to as a definition file or DAT (slang referring to “that”) file used to update the virus protection software with the latest updates. • Antivirus software performs frequent virus signature, or definition, updates. These updates are necessary for the software to detect and remove new viruses.
My Study Notes
Session 3 Personal Computer (PC) User Operations 67 Discussion Points: • Security – PC & Personal Security (1. Background Information & 2. KnowHow) • Computer Start-up (1. BIOS, 2. Safe Mode & 3.Blue-screen Death-mode) • Security 1 – User Log-in Name & Password • Windows • Installing Programmes / Uninstalling Programs (Control Panel or Alternatives) • Updates • Errors (Slow Performance or Hanging / Programme not Responding) • Systems Checks / Diagnostics • Optimising Performance (Disc Clean-up / Disc Defrag) • Restart • Security 2 – Logging Off / Shut down
Security – PC & Personal Security (1. Background Information) 68 • PC and Personal Security is paramount to keeping your PC safe from intrusion, malware and losing information. • Personal security is even more important when storing personal data on your PC. • We have already dealt with viruses and anti-virus programmes, but we need to take this a step further. • Discussion Points, Security 1 and 2 will address some of these issues, however, the PC User will need to address this more i.t.o. back-up, data storage, storage systems and devises (refer to Item 1 – KnowHow) • LOSING INFORMATION / DATA is the worst thing ever!
My Study Notes
Security – PC & Personal Security (2. KnowHow) 70 The basics of security knowhow comprises of: • 2.1. Storage / Backup Devises • 2.2. Storage Programme Systems • 2.3. PC Restore Points • 2.4. Password Protect
My Study Notes
Security – PC & Personal Security (2.1. Storage / Backup Devises) 72 Backup devises have become cheap, reliable and portable, hence many PC Users prefer this type of technology over any software or cloud options. They are also simple to store away, and data can be retrieved easily if the User’s PC has “crashed”. • External HDD or SSD (best option is a SSD, rugged, reliable and fast) • Flash Drive or Dongle (SSD Stick / SD Card) (CDs or DVDs have basically become obsolete and they damage easily!) • Sync with smartphone, laptop or tablet Always ensure your folder or file is protected from others trying to access your data.
My Study Notes
Security – PC & Personal Security (2.2. Storage Programme Systems) 74 • These systems refer mainly to cloud technology, such as “OneDrive” where your PC is synchronised with the service provider’s cloud data bases. • They are password protected, but susceptible to intrusion, although a lot has been done lately by governments to protect against this (i.e.. Protection of Personal Information or SA PPI Act 4 2013). • A danger may exist within the company’s setup and access requirements, although protection of personal data protocols provide guidelines to protect staff members against intrusion, specifically i.t.o. emails and other communication means (read your company policies!). • Cloud technology can also offer other challenges, specifically when the User’s PC has crashed, or data / airtime issues vs. non-syncing of files, etc.
My Study Notes
Security – PC & Personal Security (2.3. PC Restore Points) 76 A restore point is a specific date and time the system settings were backed up. • These points make restoring Windows to an earlier copy easy and can often get the computer working how it was when they were made. • Restore points can be created manually at any time and automatically when Windows updates are installed (check settings). • Windows creates an initial restore point when the user installs Windows for the first time on a computer, and again when Windows updates are installed. If you encounter problems after an installation or update, the restore point rollback the operating system to a previous functional state. • Restore Points only refer to the PCs Windows operating system or other programmes and will not influence your folder or files. It will NOT RETRIEVE lost or damaged folders or files!
My Study Notes
Security – PC & Personal Security (2.4 Password Protect) 78 • To password protect is to implement or enable a password on a computer, network device, online service, file, user account, or data. • When password protection is enabled, Users receive a prompt for a username or password before they're given access. • Once a password protection is in place, others can view (read-only) the folder or file, but they cannot make any changes to it. • The problem with offline folders and files is that some Users lose their passwords and cannot remember the password. • Another is that Users left their passwords unsecured for others the copy (always keep password in a safe area and create a password backup scenario).
My Study Notes
Computer Start-up (1. BIOS) 80 • A start-up refers to “powering-up” or boot-up of the computer so that the BIOS (Basic Input / Output System) ROM chip (Read-only Memory) on the motherboard allow the User to access the PC on the most basic level. • In the past (older PCs), Users could see the BIOS process taking place up to the “command prompt”. Today though the BIOS process has become faster due to more demanding PC operational programmes (i.e.. Windows), and the User cannot see this unless the User access the PC’s BIOS setup (not recommended!). • Start-ups can also occur when the PC went into a “sleep mode” (power saving mode), where the BIOS reverts back to the last known “user point”. • During the latter, Windows have automated saving properties to save data just before the PC went into sleep mode (always check for this and last date & time it was auto saved).
My Study Notes
Computer Start-up (2. SAFE Mode) 82 • Safe Mode is a software mode that enables Users of Windows to access an altered version of Windows and correct any problems preventing Windows from booting up normally. • Safe Mode differs from the Normal operating mode in that it uses default drivers and settings upon start-up, and only system required software programs are loaded upon start-up. • With a software program or computer game, Safe Mode refers to a state where the program is loaded with default settings. • For example, in a computer game, Safe Mode would not load any mods (modifications) or other add-ons that are installed. A good example of a program that uses Safe Mode is the Internet browser Mozilla Firefox, which can boot into a Safe Mode.
My Study Notes
Computer Start-up (3. Blue-screen Death-mode) 84 • Bluescreen or bug-check in Microsoft Windows is short for Blue Screen of Death (BSoD), which is a full blue screen Windows error message. • In Windows 11, it will be know as a “Black Screen”. • The Windows blue screen errors occur when a program encounters an error. I.e. programming errors such as trying to call something that does not exist, or doing something that is not allowed. • A BSoD can also occur with bad hardware, like bad memory that prevents data from properly being read or written. • In short, YOUR PC HAS DIED! Call your IT Administrator!
My Study Notes
Security 1 User Log-in Name & Password 86 • All computers and smart devices come with an automatic login and password screen. This is a security feature and should not be ignored. • It is optional for the User to “program” the device to only open / boot-up / start up when a login name and User password has been set. • However, devices without user details and passwords used for both personal and business use are wide open for intruders to enter the devise system when the User is not present. • Device login names and passwords allow access to the User only, but unfortunately, quite often found in the workplace, staff are required to share devices. Here most security-conscious companies will set up login details and individual passwords where such devices are shared. Watch out though if the device has a synchronised configuration to share information between such users.
My Study Notes
Security 1 User Log-in Name & Password (continued) 88 Strong Passwords vs. Weak Passwords: • Weak passwords are those that a hacker can decode quite easily. • Users normally chose obvious words, ID Numbers, dates or names, or a combination of these simply because they are easy remember. • This is the first point of a cyber / hacker’s attack method. They may also make user of software containing algorithms to solve obvious to more complex passwords. I.e. johnwick1975 (name surname and date of birth, an obvious guess for a hacker)
My Study Notes
Security 1 User Log-in Name & Password (continued) 90 Strong Passwords vs. Weak Passwords: • Strong passwords are those that cannot be decoded easily, or cannot be decoded at all, or will at least alert security of hackers trying to break the password code. • Here Users are normally prompted to use a strong passwords containing a string of letters, symbols and numbers. • The more complex (at least 8-characters long), the better; however, these passwords may present a problem when a User forget them and need to reset their device or account password. I.e. JOHNwick1@75-19 or jWICK@47Y19-75
My Study Notes
Windows 92 MS Windows (aka Windows or Win) is a graphical operating system developed and published by Microsoft. • It provides a way to store files, run software, play games, watch videos, and connect to the Internet. • Microsoft has published various editions of Windows and each of these Windows editions has the same core operating system, but some editions have additional features, obviously at an additional cost. • The two most common editions of Windows for home computers are Windows Home (Win Home) and for businesses Windows Professional (Win Pro). • Windows support mare than 128 GB of RAM.
My Study Notes
Windows (continued) 94 Why call it “Windows”? • Before the release of Microsoft Windows, Microsoft users were used to the single task command line operating system MS-DOS. • Because Microsoft names most of its products with one word, it needed a word that best described its new GUI (Graphical User Interface) operating system. It chose "Windows" because of the multiple windows that allow different tasks and programs to run at the same time. • Because you cannot trademark a common name like "Windows," it's officially known as "Microsoft Windows". • The first version of Microsoft Windows was version 1.0, released in 1985. Example of a single-task command: c:/lotus123 (c = command prompt & / tells it to look for a word or name)
My Study Notes
Installing Programmes / Uninstalling Programs 96 Control Panel or Alternatives Direct installation from Disc, DVD or Website with AutoPlay: • Many software titles (like the Microsoft Office suite) etc., have an AutoPlay feature. • This feature automatically starts a setup screen for the software when the CD or DVD is inserted. • If your program contains this feature, follow the steps that appear after inserting the disc into the computer (see next slide).
My Study Notes
Installing Programmes / Uninstalling Programs (Continued) 98 Control Panel or Alternatives (continued)… Direct installation from Disc, DVD or Website – AutoPlay disabled: If AutoPlay is disabled on your computer or unavailable on the software disc, follow these steps. • Open My Computer and in the “My Computer” window, open the drive containing the installation files (i.e.. if the files are on the CD-ROM drive, open the D: drive or letter of your CD-ROM drive, sometimes it can be an E: drive). • In the drive containing your files, locate either the executable setup (e.g., "setup.exe") or install file. Double-clicking this file starts the installation process. If there are multiple setup or install files, locate the executable file (EXE) or double-click each setup or install file until you find the file that starts the installation.
My Study Notes
Installing Programmes / Uninstalling Programs (Continued) 100 • Go to “Desktop” and look for the Control Panel icon, then dbl click. • Look for the “programs” icon and dbl click. • In the programs window, look for the “Programs and Features” icon and dbl click. • In the “programs and features panel”, select the program you wish to uninstall or change. Control Panel or Alternatives (continued)… Control Panel UNINSTALL Option: